IEEE 2010 JAVA PROJECTS |
| 1.Layered Approach Using Conditional Random Fields for Intrusion Detection. View : Abstract Basepaper |
| 2.Host-to-Host Congestion Control for TCP. View : Abstract Basepaper |
| 3.A Distributed Protocol to Serve Dynamic Groups for Peer-to-Peer Streaming. View : Abstract Basepaper |
| 4 .Bandwidth Recycling in IEEE 802.16 Networks. View : Abstract Basepaper |
| 5 .Distributed Explicit Rate Schemes in Multi -Input–Multi-Output Network Systems. View : Abstract Basepaper |
| 6 .Correlation-Based Traffic Analysis Attacks on Anonymity Networks. View : Abstract Basepaper |
| 7 .A Review of the Applications of Agent Technology In Traffic and Transportation Systems. View : Abstract Basepaper |
| 8 .On Modeling, Analysis, and Optimization of Packet Aggregation Systems. View : Abstract Basepaper |
| 9 .Label-Based DV-Hop Localization AgainstWormhole Attacks in Wireless Sensor Networks. View : Abstract Basepaper |
| 10.Impact of Feature Reduction on the Efficiency of Wireless Intrusion Detection Systems. View : Abstract Basepaper |
| 11.POPI A User-level Tool for Inferring Router Packet Forwarding Priority. View : Abstract Basepaper |
| 12.Staying Connected in a Mobile Healthcare System: Experiences from the MediNet Project View : Abstract Basepaper |
| 13 .Multicast Multi-path Power Efficient Routing in Mobile ADHOC networks. View : Abstract Basepaper |
| 14.Mesh Based Multicast Routing in MANET Stable Link Based Approach. View : Abstract Basepaper |
| 15.Random Access Transport Capacity. View : Abstract Basepaper |
| 16.KTR an Efficient Key Management Scheme for Secure Data Access Control in Wireless Broadcast Services. View : Abstract Basepaper |
| 17.Cooperative Caching in Wireless P2P Networks Design, Implementation, and Evaluation. View : Abstract Basepaper |
| 18.Ensuring Data Storage Security in Cloud Computing. View : Abstract Basepaper |
| 19.Secure Data Collection in Wireless Sensor Networks Using Randomized Dispersive Routes. View : Abstract Basepaper |
| 20.on Multihop Distances in Wireless Sensor Networks with Random Node Locations. View : Abstract Basepaper |
| 21.Optimal Jamming Attacks and Network Defense Policies in Wireless Sensor Networks. View : Abstract Basepaper |
| 22.Always Acyclic Distributed Path Computation. View : Abstract Basepaper |
| 23.Achieving Network Level Privacy in Wireless Sensor Networks. View : Abstract Basepaper |
| 24.Modified DSR (Preemptive) to reduce link breakage and routing overhead for MANET using Proactive Route Maintenance (PRM). View : Abstract Basepaper |
| 25.Secure Data Objects Replication in Data Grid. View : Abstract Basepaper |
| 26.TDMA Scheduling with Optimized Energy Efficiency and Minimum Delay in Clustered Wireless Sensor Networks. View : Abstract Basepaper |
| 27.IRM Integrated File Replication and Consistency Maintenance in P2P Systems. View : Abstract Basepaper |
| 28.Distributed Relay-Assignment Protocols for Coverage Expansion in Cooperative Wireless Networks. View : Abstract Basepaper |
| 29.Castor Scalable Secure Routing for Ad Hoc Networks. View : Abstract Basepaper |
| 30.Equilibrium of Heterogeneous Congestion Control Optimality and Stability. View : Abstract Basepaper |
| 31.Replication routing in DTNs: a resource allocation approach. View : Abstract Basepaper |
| 32.Client-side Load Balancer using Cloud. View : Abstract Basepaper |
| 33.A Cooperative Diversity-based Robust MAC Protocol in Wireless Ad Hoc Networks. View : Abstract Basepaper |
| 34.A General Framework for Service Availability for Bandwidth-Efficient Connection-Oriented Networks. View : Abstract Basepaper |
| 35.A Novel Cross Layer Intrusion Detection System in MANET. View : Abstract Basepaper |
| 36.Network-Based Traitor-Tracing Technique Using Traffic Pattern. View : Abstract Basepaper |
PROJECT UNDER DEVELOPMENT GOING |
| 37 .Rate Control With Pair wise Intersession Network Coding. Ieee Networking |
| 38.Optimal Jamming Attack Strategies and Network Defense Policies in Wireless Sensor Networks. Ieee Networking |
| 39.Providing Witness Anonymity Under Peer-to-Peer Settings. Ieee Mobile Computing |
| 40.On the Performance Bounds of Practical Wireless Network Coding. Ieee Network Security |
| 41.Inside the Permutation-Scanning Worms: Propagation Modeling and Analysis. Ieee Networking |
| 42.VEBEK: Virtual Energy-Based Encryption and Keying for Wireless Sensor Networks. Ieee Mobile Computing |
| 43.Joint Sink Mobility and Routing to Maximize the Lifetime of Wireless Sensor Networks: The Case of Constrained Mobility. Ieee Networking |
| 44.A Puzzle-Based Defense Strategy Against Flooding Attacks UsingGame Theory. Ieee Network Security |
| 45.MABS: Multicast Authentication Based on Batch signature. Ieee Mobile Computing |
| 46 .SSUM: Smart Server Update Mechanism for Maintaining Cache Consistency in Mobile Environments. Ieee Mobile Computing |
| 47.Modeling Power Saving Protocols for Multicast Services in 802.11 Wireless LANs. Ieee Mobile Computing |
| 48 .A General Framework for Service Availability for Bandwidth- Efficient Connection-Oriented Networks . Ieee Networking |
| 49 .DCAR: Distributed Coding-Aware Routing in Wireless Networks. Ieee Mobile Computing |
| 50 .Provably Secure Nested One-Time Secret Mechanisms for Fast Mutual Authentication and Key Exchange in Mobile Communications. Ieee Networking |
| 51 .Shifting Inference Control to User Side: Architecture and Protocol. Ieee Network Security |
| 52 .Optimal Relay Station Placement in Broadband Wireless Access Networks. Ieee Mobile Computing |
| 53 .Using Web-Referral Architectures to Mitigate Denial-of-Service Threats . Ieee Network Security |
| 54 .A Parallel Self-Routing Rearrangeable Non-blocking Multi-Photonic Switching Network. Ieee Networking |
| 55 .Energy-Aware Tag Anti-collision Protocols for RFID Systems. Ieee Mobile Computing |
| 56 .An Abuse-Free Fair Contract-Signing Protocol Based on the RSA Signature . Ieee Network Security |
| 57 .A Dynamic En-route Filtering Scheme for Data Reporting in Wireless Sensor Networks. Ieee Networking |
| 58 .Channel Assignment for Multi-hop Cellular Networks: Minimum Delay. Ieee Mobile Computing |
| 59 .Provisioning of Deadline-Driven Requests With Flexible Transmission Rates in WDM Mesh Networks. Ieee Networking |
| 60 .Secure Client-Side ST-DM Watermark Embedding. Ieee Network Security |
| 61 .Maximizing Rewards in Wireless Networks with Energy and Timing Constraints for Periodic Data Streams. Ieee Mobile Computing |
| 62 .Toward Practical Opportunistic Routing With Intra-Session Network Coding for Mesh Networks. Ieee Networking |
| 63 .TCAM Razor: A Systematic Approach Towards Minimizing Packet Classifiers in TCAMs. Ieee Networking |






0 comments:
Post a Comment